We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Nasahl P., Schilling R., Werner M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 187–199
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Nasahl P., Schilling R., Werner M., Hoogerbrugge J., Medwed M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 200–212
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 1469-1486
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 2021 IEEE International Symposium on Hardware Oriented Security and Trust, 68-79, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 56-67, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021, ASIACRYPT 2021, 3-32, (Lecture Notes in Computer Science; vol. 13091)
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1)
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium, 29th USENIX Security Symposium, 1677-1694, (Proceedings of the 29th USENIX Security Symposium)
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 93-101
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 390-416
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 46-56
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser S., Werner M., Brasser F., Malenko M., Mangard S., Sadeghi A.
Proceedings 2019 - Network and Distributed System Security Symposium (NDSS) , Internet Society
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Dobraunig C., Mangard S., Mendel F., Primas R.
Selected Areas in Cryptography – SAC 2018, Springer, 257-277, (Lecture Notes in Computer Science; vol. 11349)
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings, 2019 International Conference on Verification, Model Checking, and Abstract Interpretation , 183-204, (Lecture Notes in Computer Science; vol. 11388)
Protecting RISC-V Processors against Physical Attacks
Werner M., Schilling R., Unterluggauer T., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition, 1136-1141
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium, 27th USENIX Security Symposium, 973-990
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 13th ACM ASIA Conference on Information, Computer and Communications Security, 587-600
A unified masking approach
Groß H., Mangard S.
Journal of Cryptographic Engineering